Skip to content

Ivanti Connect Secure NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000412-NDM-000331

    Group
  • The ICS must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 approved algorithm.

    If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including a...
    Rule High Severity
  • The ICS must be configured to prevent nonprivileged users from executing privileged functions.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule High Severity
  • The ICS must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

    If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...
    Rule Medium Severity
  • The ICS must be configured to record time stamps for audit records that can be mapped to Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules